CSE 484 / CSE M 584: Computer Security (Spring 2017)

Assignments and labs will be posted on this page throughout the quarter.All dates are tentative until the assignment/lab is officially posted.

In-Class Activities

In-class activities are just that -- worksheets or activities done in class. Be sure to write your name, email address, UWNetID, and the date on each activity when you turn it in.

You are given at least three free in-class activity days, which you can use while you’re traveling, etc. We will clarify this description in class. The use of the words “at least” is because we currently do not know exactly how many days we’ll have in-class activities, and we may allow additional free days depending on the total number of days with in-class activities.

I will keep complete in-class worksheets until after the quarter ends -- feel free to stop by my office to pick yours up anytime.

Homeworks

Unless otherwise specified, all submissions must be typed and submitted as PDF files; handwritten assignments and non-PDF files will not be accepted. Unless otherwise specified, submit homeworks online at the following URL: https://catalyst.uw.edu/collectit/dropbox/franzi/40080.

At the top of your assignment, be sure to write your name, email address, UWNetID, the homework assignment number (e.g. "Homework 1"), due date, any references that you used (besides the course texts and assigned readings), and the names of any people that you discussed the assignment with.

Final Project

CSE M 584 Research Component

If you are enrolled in CSE M 584, then you must also read the following papers and submit written reviews by the specified deadline. The usual late submission policy applies. Your evaluations should have the following form:

Your name.

Paper title and author(s).

What problem does the paper address?

Two (or more) most important new ideas in the paper, and why.

What is the approach used to solve the problem?

How does the paper support or otherwise justify its arguments and conclusions?

Two ways the paper could be improved, and why.

Two important, open research questions on the topic, and why they matter.

You can find one version of advice on how to read a CS research paper here. You are also welcome to come discuss the reading process or the papers themselves with the course staff.

You must submit evaluations as a PDF file. You should upload the evaluations to the online Catalyst dropbox. Your evaluation for each reading must be less than one page long, be single-spaced, use 12pt font, and have at least 1 inch margins; We expect for most paper evaluations to be approximately 1/2 to 3/4 pages long.

You are welcome to, and in fact encouraged to, discuss the papers with other students in the class or the course instructors. However, you must write the evaluations on your own.

You are allowed to look at other top computer security conferences, like USENIX Security 2016 (https://www.usenix.org/conference/usenixsecurity16/technical-sessions), for more recent papers. You can substitute any paper from this conference for one of the papers above, if one of these papers interest you. You may also check with the instructor for additional options/suggestions for substitute papers.

Extra Credit: You may also read up to five additional papers for extra credit. CSE 484 students may also read up to five papers, from USENIX Security 2016, from the above list, or other papers approved by the instructor, for extra credit. All extra credit readings are due on June 1, 11:59pm.